around for further forensics. As with most of the DDoS tools, this assumes the agents are using the default settings.